Zagazig University Digital Repository
Home
Thesis & Publications
All Contents
Publications
Thesis
Graduation Projects
Research Area
Research Area Reports
Search by Research Area
Universities Thesis
ACADEMIC Links
ACADEMIC RESEARCH
Zagazig University Authors
Africa Research Statistics
Google Scholar
Research Gate
Researcher ID
CrossRef
Secure and Robust High Quality DWT Domain Audio Watermarking Algorithm with Binary Image
Faculty
Not Specified
Year:
2012
Type of Publication:
InProcceding
Pages:
Authors:
Elshazly, A. R, Fouad, M. M, Nasr, M. E
Journal:
IEEE
Volume:
Research Area:
Computer Science; Engineering
ISSN
ISI:000320458000033
Keywords :
Audio watermarking, Binary image, normalized cross correlation, Robustness, Security component, formatting, style, styling, insert (key words)
Abstract:
To enhance security and robustness of digital audio watermarking algorithms, this paper presents an algorithm based on mean-quantization in Discrete Wavelet Transform (DWT) domain. A binary image is used as a watermark, and is encrypted with chaotic encryption with secret key. This approach is based on the embedding of an encrypted watermark in the low frequency components using a two wavelet functions with adaptation to the frame size. The reason for embedding the watermark in the low frequency components is that these components' energy is high enough to embed the watermark in such a way that the watermark is inaudible; therefore, it should not alter the audible content and should not be easy to remove. The algorithm has a good security because only the authorized can detect the copyright information embedded to the host audio signal. The watermark can be blindly extracted without knowledge of the original signal. To evaluate the performance of the presented audio watermarking method, objective quality tests including bit error rate (BER), normalized cross correlation(NCC), peak-signal to noise ratio (PSNR) are conducted for the watermark and Signal-to-Noise Ratio(SNR) for audio signals. The tests' results show that the approach maintains high audio quality, and yields a high recovery rate after attacks by commonly used audio data manipulations such as noise addition, amplitude modification, low-pass filtering, re-uantization, re-sampling, cropping, cutting, and compression. Simulation results show that our approach not only makes sure robustness against common attacks, but it also further improves systemic security and robustness against malicious attack.
Online
PDF
جامعة المنصورة
جامعة الاسكندرية
جامعة القاهرة
جامعة سوهاج
جامعة الفيوم
جامعة بنها
جامعة دمياط
جامعة بورسعيد
جامعة حلوان
جامعة السويس
شراقوة
جامعة المنيا
جامعة دمنهور
جامعة المنوفية
جامعة أسوان
جامعة جنوب الوادى
جامعة قناة السويس
جامعة عين شمس
جامعة أسيوط
جامعة كفر الشيخ
جامعة السادات
جامعة طنطا
جامعة بنى سويف